The Realities of Upgrading: What You Need to Know Before Migrating from End-of-Life Angular 18
21 Apr, 2026
HeroDevs blog: https://www.herodevs.com/blog-posts/the-realities-of-upgrading-what-you-need-to-know-before-migrating-from-end-of-life-angular-18
CVE-2025-9551: Brute Force Vulnerability in Drupal's Protected Pages Module
17 Apr, 2026
HeroDevs blog: https://www.herodevs.com/blog-posts/cve-2025-9551-brute-force-vulnerability-in-drupals-protected-pages-module
Node.js 20 Goes EOL: How to Stay Secure Without a Full Migration
26 Mar, 2026
HeroDevs blog: https://www.herodevs.com/blog-posts/node-js-20-goes-eol-how-to-stay-secure-without-a-full-migration
CVE-2026-29057 and CVE-2026-27980: Two New Vulnerabilities Affecting End-of-Life Next.js
25 Mar, 2026
HeroDevs blog: https://www.herodevs.com/blog-posts/cve-2026-29057-and-cve-2026-27980-two-new-vulnerabilities-affecting-end-of-life-next-js
HeroDevs Announces Never-Ending-Support (NES) for Angular 19
18 Mar, 2026,
No comments
HeroDevs blog: https://www.herodevs.com/blog-posts/herodevs-announces-never-ending-support-nes-for-angular-19
Risk Management Framework: How Veeam Strengthens Cyber Resilience
21 Oct, 2025,
No comments
Veeam Blog: https://www.veeam.com/blog/risk-management-framework.html
How Generative AI Can Strengthen Your Security Posture
19 Sep, 2025
Veeam blog: https://www.veeam.com/blog/generative-ai-security-improve-security-posture.html
How to Prevent Supply Chain Ransomware Attacks
29 Aug, 2025
Veeam blog: https://www.veeam.com/blog/ransomware-attacks-supply-chain-2025.html
Ransomware Recovery: Comprehensive Strategies to Ensure Data Resilience
15 Aug, 2025
Veeam blog: https://www.veeam.com/blog/ransomware-recovery-what-you-need-to-know.html
Minimum Viable Business and Minimum Viable Company for Cyber Resilience: What You Need to Know
6 Aug, 2025
Veeam blog: https://www.veeam.com/blog/minimum-viable-business-and-company-cyber-resilience.html
YARA Rules Guide: What They Are and How to Write Them
21 Jul, 2025,
No comments
Veeam blog: https://www.veeam.com/blog/yara-rules-malware-detection-analysis.html
Your Guide to Data Resilience and SIEM Solutions
6 May, 2025,
No comments
eBook: https://www.veeam.com/resources/wp-your-guide-to-data-resilience-and-siem-solutions.html
CrowdStrike and Veeam: Enhancing Data Security with Proactive Threat Detection
23 Apr, 2025
Veeam blog: https://www.veeam.com/blog/crowdstrike-and-veeam-enhancing-data-security.html
Recon Scanner Detects Malicious Activity & Prevents Cyberattack
8 Apr, 2025
Veeam blog: https://www.veeam.com/blog/veeam-recon-scanner-case-study.html
Ransomware Recovery: A Comprehensive Guide
3 Mar, 2025
eBook : https://www.veeam.com/resources/wp-ransomware-recovery-comprehensive-guide.html
Your Guide to Secure by Design and Data Protection
2 Mar, 2025,
No comments
ebook: Secure by Design whitepaper
Crafting an Effective Incident Response Plan
19 Feb, 2025,
No comments
Veeam blog: https://www.veeam.com/blog/incident-response-plan-guide.html
Secure by Design: Building a Safer Data Future
5 Feb, 2025
Veeam blog: https://www.veeam.com/blog/secure-by-design-data-security.html
What is Zero Trust Security? Principles & Benefits
22 Jan, 2025,
No comments
Veeam Blog: https://www.veeam.com/blog/zero-trust-security.html